Attack Graph-Based Approach For Enterprise Networks Security Analysis

Size: px
Start display at page:

Download "Attack Graph-Based Approach For Enterprise Networks Security Analysis"

Transcription

1 International Journal Of Engineering And Computer Science ISSN: Volume 5 Issue 5 May 2016, Page No Attack Graph-Based Approach For Enterprise Networks Security Analysis ABSTRACT Saidu Isah Rambo, Ibrahim M, Anka Network administrators are always faced with numerous challenges of identifying threats and in retrospect, securing the organization s network. The classical approach of identifying the vulnerability in the network is by using commercially developed tools that do not take into cognisance vulnerability interaction between network elements and their behavioral pattern.therefore, network administrators have to take a hollistic methods to identify vulnerability interrelationships to be captured by an attack graph which will help in identifying all possible ways an attacker would have access to critical resources. The objective therefore is to design an attack graph based approach for analyzing security vulnerabilities in enterprise networks, implement and evaluate performance of the approach. This work proposes an attack graph network security analyser based. The attack graph directly illustrates logical dependencies among attack goals and configuration information. In the attack graph, a node in the graph is a logical statement and an edge in the graph is represented by causality relation between network configurations and an attacker s potential privileges. The benchmark is just a collection of Datalog tuples representing the configuration of the synthesized networks, the graph generation CPU time was compared to Sheyner attack graph toolkit. The result in the graph shows the comparison of the graph builder CPU time for the case of a fully connected network and 5 vulnerabilities per host which shows Sheyner s tools grows exponentially.some important contributions of this work include establishing an attack graph based approach for enterprise networks security analysis that can capture generic security interactions and specify security relevant configuration information. KEYWORDS: Datalog, CERT/CC, FW, webserver, workstation, fileserver. 1.1 INTRODUCTION The increased dependent and reliance of networks by enterprise cannot be over emphasized. The external as well as the internal, threats that are continually faced by these enterprises have always increased phenomenally. Network security administrators are always faced with numerous challenges of identifying these threats and in retrospect, securing the organization s network. The classical approach of identifying the vulnerability of each element in the network is by using commercially developed tools that do not take into cognisance vulnerability interaction between network elements. Additionally, it has to identify the behavioral pattern of individual elements in the network. Therefore, network administrators have to take a more proactive and hollistic approach to identify vulnerability interrelationships and possible interaction to be captured by an attack graph which would help in identifying all possible ways in which an attacker would have access to critical resources in the network. Statistically, network administrators are most often faced with challenges as a result of software vulnerabilities on network hosts. For over 20 years, there have been an ever-growing number of Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16532

2 security vulnerabilities discovered in software and information systems. According to the statistics published by CERT/CC in (2013); a central organization for reporting security incidents, the numbers of reported vulnerabilities have grown considerably in the last 10 years. It is expected that the rate at which new software vulnerabilities emerge will continue to increase, in the foreseeable future. With thousands of new vulnerabilities discovered each year, maintaining 100% patch level is untenable and sometimes undesirable for most organizations, while in many cases patches come right after vulnerability reports (William et al., 2000). 2.1 MATERIALS AND METHOD The systems require PC s with the following minimum configurations: The performance of the MulVAL scanner on a Linux 9 host (kernel version ) was measured. The CPU B940 is an Intel(R) Pentium(R) processor with 4.0GB RAM. 40GB hard disk drive, A VGA monitor, A standard keyboard, a mouse and a converter/ups to provide protection to the systems from excess power source. The system is to be loaded with a unix/ linux software or the internetworks operating system of the Microsoft software and other relevant softwares. There should also be an internet connection of atleast 3G internet link. Routers and firewalls with different specifications are needed for the serial connections and can also be used for the LAN connections. Switches, hubs, repeaters, bridges and vlans used in various connections are to be configured as appropriate to provide smooth communication. Fibre optic cables, coaxial cables, STP cables UTP cables and various specifications of CAT 5 cables are needed to provide straightthrough cables, crossover cables and the rollover cables where applicable. VSAT with a c-band is needed to direct communication with the satellite or the service provider. 3.1 SYSTEM DESING A logical attack graph is a di-graph and can be represented in the form of tree with a possible cross links between nodes. Figure 3.1 shows both the graph representation of a logical attack graph. There are two kinds of nodes in the graph; the derivation node and the fact node. The derivation node is represented as a rectangle and the fact node is represented as a circle/small star. There are also two kinds of fact node; the primitive fact node represented as a solid small star and the derived fact node is represented as a circle with a number inserted or encribed inside. Every fact node in a logical graph is label with a logical statement in a form of a predicate applied in its argument. The root node is the attack goal; in the example it is execode(attacker,workstation,root) meaning the attacker can execute arbitrary code as user root on machine workstation Every derivation node is label with an interaction rule that is used for the derivation step. 0 r 1 r R 3 4 R R 5 r2 a r2 b 6 r 6 Fig 3.1: Graphical representation of logical attack graph Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16533

3 [networkservice (Host, Program, The edge in the graph represent the depend on relation. A fact node depends on one or more derivation node, each of which represent an application of an interaction rule that yield the fact; a derivation node depend on one or more fact nodes which together satisfies the precondition of a rule. Thus, a logical attack graph is a bipartite di-graph. The derivation nodes serves a medium between a facts and its reasons, i.e. how the fact becomes true. The derivation nodes directed from the fact node forms a disjunction. A derivation node represent a successful application of an interaction rule where all its preconditions are satisfied by its children. Therefore, the fact nodes directed from a derivation node forms a conjunction. 3.2 Algorithm The proposed attack graph directly illustrates logical dependencies among attack goals and configuration information. The reasoning engine was modified so that besides a true or false answer, a Prolog query also records an attack simulation trace as a side effect of the evaluation and translated into the following form: ExecCode (Attacker, Host, User) :- networkservice (Host, Program, Protocol, Port, User) vulexists (Host,Vul ID, Program, remoteexploit, PrivEscalation), netaccess (Attacker, Host, Protocol, Port), assert_trace(because ( remote exploit of a server program, execcode(attacker, Host, User), Protocol, Port, User), vulexists (Host, Vul ID, Program, remoteexploit, PrivEscalation), netaccess (Attacker, Host, Protocol, Port)])). A sub-goal is added, which calls the function assert_trace. When the evaluation of the rule succeeds, this function records the successful derivation into a trace file. In the attack graph, a node in the graph is a logical statement and an edge in the graph is represented by causality relation between network configurations and an attacker s potential privileges. A logical attack graph was viewed as a derivation graph for a successful Prolog query. In Prolog query, there is a derivation node and node, where all it children are conjuncted. A derived fact node is an or node where all it children represent different ways to derive and the primitive fact node is a leaf node in the graph which represent a pieces of configuration information. Let (N r, N p, N d, Е, L, G)represents a logical attack graph, where N r, N p, and N d and G are sets of derivation nodes, primitive fact nodes, derived fact nodes and attacker s goal respectively and are also referred to as disjoint nodes in the graph;е (N r x (N p Ս N d, )) Ս (N d x N r ), L is the mapping from a node to its label and G ϵ N d is the attacker s goal. Also, Let T, I, C, F represent the trace step terms (interaction rule, fact and conjunct) and attacker s goal G, interactionrule (a string associated with interaction rule), conjunct (an instantiation fact or list of fact of interaction rule) and predicates (list of constant) respectively. A fact is primitive if it comes from the input to the MulVal-reasoning engine. A derived fact is the result of applying interaction rule iteratively on the input facts. The attack graph is obtained as follows: Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16534

4 Let N r, N p, N d, Е, L 0; For each t ϵ Ƭ, the derivation node r is N r N r Ս {r}; L L Ս {r I}; For n ϵ N d suchthat L{n} = F then Е Е Ս {(n, r) Otherwise, a new fact node n is created as L L Ս {r Fact}; N d N d Ս {n}; For each fact f in C For c ϵ (N p Ս N d) such thatl(c) = f then Е Е Ս {(r, c)} Otherwise, a new fact node c is created as L LՍ {c f} looping. The evidence is stored in the Prolog database and can be extracted for visualization. According to test results (Bernstein et al., 2000), online justification only introduces 8% runtime overhead to the program, much better than metainterpretation. To avoid the exponential blow up of proof trees, an acyclic graph can be out-putted visualizing the logical relationships among derived literals. The size of such graphs is polynomial to the size of the program. For the attack graph generated to be more useful and userfriendly attack graph generating software was developed. 4.1 LOGICAL TRACE STEP A logic attack graph can be constructed from the trace step information. Every trace step term becomes a derivation node in the attack graph. The fact field in the trace step becomes the node s parent and the conjunct field becomes its children. The performance evaluation of the approach was based on the computational complexity of the new approach with the existing one. The generation of attack trace only introduces a constant time overhead for every successful Prolog engine derivation. Figure 4.4 shows the number of attack simulation trace steps, which is the inputed to the graph builder, is shown for the same set of test cases. For the worst case scenario, the number of trace steps is a quadratic function of the number of hosts. This verifies that Datalog evaluation inthe reasoning engine takes O(n2 ) derivation steps to complete. 3.3 Logical/automated attack-graph generation While attack trees generated by the metainterpreter serve the purpose of visualizing attack paths, the methodology also has several setbacks. Meta-interpreting; a prolog program is one order of magnitude slower than executing it directly in Prolog. Moreover, even if there is only a polynomial number of facts that can be derived by a Datalog program, the number of proof/attact trees generated could be exponential in the worst case. The XSB system includes a justifier program (Bernstein et al., 2000) that can compute evidence of derived literals while the program is running, thus eliminating the need for meta-interpreting and repeatation which might eventually result in Figure 4.1: Graph representing trace steps 4.2 CPU Usage Figure 4.1 shows the graph generation CPU time for each of the simulated analysis Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16535

5 problems of various sizes and topologies. The worst case is for a fully connected network. In this case the asymptotic CPU time is between O(n2 ) and O(n3 ), where n is the number of hosts. In Figure 4.2, it is noted that ideally the complexity is O(n2 ), if table look-up takes constant time. However, our implementation uses the simple map template in Java standard library and its look-up time depends on the size of the table. It is opined that after replacement with a custom-designed hash table implementation, the graph generation time would be near quadratic even for the worst case scenario. are not identical, although the difference is not quite visible on logarithmic scale. Figure 4.3: Graph generation memory usage as a function of network size for several network topologies. Figure 4.2: Graph generation CPU usage as a function of network size for several network topologies. Figure 4.4shows that the number of derived fact nodes in the attack graph grows linearly with the size of the network. An interesting case is the one for the star topology where the graph nodes remain constant regardless of the network size. This is because in that topology, the only attack path is from the attack machine to the hub, and then from the hub to the target machine. 4.3 RAM usage Figure 4.3 showsthe memory usage as a function of network size for the same four network topologies. The worst case here is again a fully connected network, which has a asymptotic memory usage slightly lower than O(n 2 ). In the two biggest cases (1000 host for fully-connected and partitioned network), we almost exhausted the 1GB memory on the test machine. The memory usage for the star and ring topology Figure 4.4: Graph representing derived facts Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16536

6 Figure 4.5 Showsthe attack graph generation CPU time is shown as a function of the network size for a fully connected network and for the number of vulnerabilities per host varied from 1 to 100. It shows that vulnerability density has a bigger impact when the network size is small. As the network size grows the CPU time is dominated by the number of machines, and thus vulnerability density has a less visible impact. Our graph builder was directly compared to the Sheyner attack graph toolkit by running both tools with equivalent input data. The Sheyner attack graph toolkit was tested on a Pentium III-M CPU, 256MB RAM, Fedora Core 1 LINUX operating system. Figure 4.6 Graph generation CPU time Figure 4.6Graph generation CPU time compared to Sheyner attack graph toolkit. Fully connected network and 5 vulnerabilities per host. 5.0 CONCLUSION AND RECOMMENDATIONS 5.1 CONCLUSION Figure 4.5: Graph generation CPU time Figure 4.5: Graph generation CPU time for a fully connected network and number of vulnerabilities per host varying from 1 to 100. Figure 4.6 is a comparison of graph builder CPU time for the case of a fully connected network and 5 vulnerabilities per host (note that only the Y axis is on logarithmic scale in this chart). From the diagram it is clear that the running time for Sheyner's tool grows exponentially. The growth trend for MulVAL is not obvious in this diagram because the running time is too short. But the difference between the two tools is obvious. The ultimate objective of this paper is to The specific objectives are to: design an attack graph based approach for analyzing security vulnerabilities in enterprise networks; andimplement and evaluate performance of the approach. 5.2 RECOMMENDATIONS: It is recommended that It would be necessary for further study to be carried out in the areas of Also, the patching of machines in a network systems does not require rebooting the system. It would be an interesting research topic to study how to provide automatic and a heuristics as to what countermeasures to apply. This is beyond the scope of this dissertation and is left for further research work. Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16537

7 Finally, there is need to investigate precisely how to handle aggregates and negation in a distributed setting. It seems to be possible to incorporate well-known techniques to maintain states in the centralized setting into PSN v References Roychoudhury A., Ramakrishnan C. R., and Ramakrishnan I. V. (2000). Justifying proofs using memo tables. In Principles and Practice of Declarative Program- ming, pages Konstantinou A.V., Yemini Y. and Florissi D. (2002). Towards self-configuring networks. In DARPA Active Networks Conference and Exposition (DANCE), San Franscisco, CA. Gelder A., Ross K. and Schlipf J.S. (1988). Unfounded sets and well- founded semantics for general logic programs. In PODS 88: Proceedings of the seventh ACM SIGACT- SIGMOD-SIGART symposium on Principles of database systems, pages ,, ACM Press. New York, NY, USA. Keromytis A.D., Ioannidis S., Greenwald M.B., Smith J.M. (2003). The STRONGMAN architecture. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), pages , Washington, DC. Roscoe T. and Stoica I. (2005). Implementing Declarative Overlays. In SOSP. Loo B.T., Hellerstein J.M., Stoica I. and Ramakrishnan R. (2005). Declarative Routing: Extensible Routing with Declarative Queries. In SIGCOMM. Loo B.T., Condie T., Garofalakis M., Gay D.E., Hellerstein J.M. Maniatis P., Ramakrishnan R., Roscoe T., and Stoica I. (2006). Declarative Networking: Language, Execution and Optimization. In SIGMOD. Loo B.T., Condie T., Garofalakis M., Gay D.E., Hellerstein J.M., Maniatis P., Ramakrishnan R., Roscoe T. Stoica I. (2009). Declarative Networking. In Communications of the ACM (CACM). Loo B.T., Zhou W. (2012) NDlog Declarative Networking declarative query language for specifying and implementing network protocols, Morgan & Claypool Publishers, Washington. Schneier B., Wiley J. (2000) Secrets & Lies: Digital Security in a Networked World, chapter 21. Wang A., Jia L., Liu C., Loo B.T., Sokolsky O. and Basu P. (2009). Formally Verifiable Networking. In SIGCOMM HotNets-VIII. Gupta A., Mumick I.S. and Subrahmanian V. S. (1993). Maintaining views incrementally. In Peter Buneman and Sushil Jajodia, editors, Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, D.C., May 26-28, pages ACM Press. Loo B.T., Condie T., Hellerstein J.M., Maniatis P., Saidu Isah Rambo, IJECS Volume 05 Issue 5 May 2016 Page No Page 16538

Attack Graph Techniques

Attack Graph Techniques Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration

More information

MulVAL: A logic-based network security analyzer

MulVAL: A logic-based network security analyzer 14th USENIX Security Symposium, August 2005 MulVAL: A logic-based network security analyzer Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel Princeton University Outline Introduction Representation

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

A logic-programming approach to. network security analysis

A logic-programming approach to. network security analysis A logic-programming approach to network security analysis Xinming Ou A Dissertation Presented to the Faculty of Princeton University in Candidacy for the Degree of Doctor of Philosophy Recommended for

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

MulVAL: A Logic-based Network Security Analyzer

MulVAL: A Logic-based Network Security Analyzer MulVAL: A Logic-based Network Security Analyzer Xinming Ou Sudhakar Govindavajhala Andrew W. Appel Princeton University {xou, sudhakar, appel}@cs.princeton.edu Abstract To determine the security impact

More information

Secure Network Provenance

Secure Network Provenance Secure Network Provenance Wenchao Zhou *, Qiong Fei*, Arjun Narayan*, Andreas Haeberlen*, Boon Thau Loo*, Micah Sherr + * University of Pennsylvania + Georgetown University http://snp.cis.upenn.edu/ Motivation

More information

HC-6950. Emission Protected Security Workstation

HC-6950. Emission Protected Security Workstation Emission Protected Crypto AG / 6950-e-2.ppt / DA-HQ / 0004 / 1 PC and Workstation Risks Security Risks: Unauthorized change of data (Sabotage, Viruses) Unauthorized use of data Data loss (deletion) Physical

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons: Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

A Framework for Analysis A Network Vulnerability

A Framework for Analysis A Network Vulnerability A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Where do you Install Cyber Predator on your Network so you can collect all the data packets?

Where do you Install Cyber Predator on your Network so you can collect all the data packets? Where do you Install Cyber Predator on your Network so you can collect all the data packets? The purpose of this document is to demonstrate to a new or existing Cyber Predator user where in a network the

More information

Attack graph analysis using parallel algorithm

Attack graph analysis using parallel algorithm Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA

More information

GEDAE TM - A Graphical Programming and Autocode Generation Tool for Signal Processor Applications

GEDAE TM - A Graphical Programming and Autocode Generation Tool for Signal Processor Applications GEDAE TM - A Graphical Programming and Autocode Generation Tool for Signal Processor Applications Harris Z. Zebrowitz Lockheed Martin Advanced Technology Laboratories 1 Federal Street Camden, NJ 08102

More information

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

A LOGIC-BASED NETWORK FORENSICS MODEL FOR EVIDENCE ANALYSIS

A LOGIC-BASED NETWORK FORENSICS MODEL FOR EVIDENCE ANALYSIS Chapter 1 A LOGIC-BASED NETWORK FORENSICS MODEL FOR EVIDENCE ANALYSIS Changwei Liu, Anoop Singhal and Duminda Wijesekera Abstract Modern-day attackers tend to use sophisticated multi-stage/multi-host attack

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Virtual Terrain: A Security-Based Representation of a Computer Network

Virtual Terrain: A Security-Based Representation of a Computer Network Virtual Terrain: A Security-Based Representation of a Computer Network Jared Holsopple* a, Shanchieh Yang b, Brian Argauer b a CUBRC, 4455 Genesee St, Buffalo, NY, USA 14225; b Dept. of Computer Engineering,

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Chapter 15: Distributed Structures. Topology

Chapter 15: Distributed Structures. Topology 1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect

More information

Symbol Tables. Introduction

Symbol Tables. Introduction Symbol Tables Introduction A compiler needs to collect and use information about the names appearing in the source program. This information is entered into a data structure called a symbol table. The

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Operating system Dr. Shroouq J.

Operating system Dr. Shroouq J. 3 OPERATING SYSTEM STRUCTURES An operating system provides the environment within which programs are executed. The design of a new operating system is a major task. The goals of the system must be well

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Network Security Demonstration - Snort based IDS Integration -

Network Security Demonstration - Snort based IDS Integration - Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and

More information

How To Test Performance Of A Network Attack Graph On A Network

How To Test Performance Of A Network Attack Graph On A Network Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation James Cullum, Cynthia Irvine and Tim Levin Naval Postgraduate School, Monterey,

More information

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Item Minimum Required Recommended Notes

Item Minimum Required Recommended Notes Carestream Dental strongly adheres to compliance with Microsoft Windows operating systems and hardware compatibility (HCL), which can be found at www.microsoft.com/whdc/hcl/default.mspx. Only operating

More information

Designing HP SAN Networking Solutions

Designing HP SAN Networking Solutions Exam : HP0-J65 Title : Designing HP SAN Networking Solutions Version : Demo 1 / 6 1.To install additional switches, you must determine the ideal ISL ratio. Which ISL ratio range is recommended for less

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7 MYOB EXO System Requirement Guidelines 30 April 2014 Version 2.7 Contents 1 System Requirements 4 1.1 Overview 4 1.2 Server Requirements 4 1.2.1 Server Requirements (excluding terminal server) 4 1.2.2

More information

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology.

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform

More information

Package Contents. D-Link DSN-3200/3400 Installation Guide. DSN-3200/3400 xstack Storage Area Network (SAN) Array. CD-ROM with User Guide.

Package Contents. D-Link DSN-3200/3400 Installation Guide. DSN-3200/3400 xstack Storage Area Network (SAN) Array. CD-ROM with User Guide. Package Contents DSN-3200/3400 xstack Storage Area Network (SAN) Array CD-ROM with User Guide Keys Rack mount Rails Power Cables Hardware and Screws 2 If any of the above items are missing, please contact

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Quareo ICM Server Software

Quareo ICM Server Software The Quareo Infrastructure Configuration Manager (ICM) is a server software application designed to document and administer both passive and active network connectivity infrastructure. ICM enables management

More information

NComputing L-Series LAN Deployment

NComputing L-Series LAN Deployment NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.

More information

How To Manage A Network

How To Manage A Network Network Management Keeping the Network Alive from Afar Network management is the process of documenting, monitoring, troubleshooting, and configuring network devices. Network management gives visibility

More information

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved.

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. Parallels Virtuozzo Containers 4.0 for Linux Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Installing an Omnicast System Omnicast version 3.5

Installing an Omnicast System Omnicast version 3.5 Installing an Omnicast System Omnicast version 3.5 INST-9001 Version 1.0 INST-9001 Page 1 Omnicast Install Table of Contents 1 PREAMBLE...3 1.1 DOCUMENT REVISIONS...3 1.2 OMNICAST OVERVIEW...3 1.3 SUPPORTED

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

CHAPTER 6 NETWORK DESIGN

CHAPTER 6 NETWORK DESIGN CHAPTER 6 NETWORK DESIGN Chapter Summary This chapter starts the next section of the book, which focuses on how we design networks. We usually design networks in six network architecture components: Local

More information

CONDIS. IT Service Management and CMDB

CONDIS. IT Service Management and CMDB CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...

More information

Programmable Networking with Open vswitch

Programmable Networking with Open vswitch Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

University of Pennsylvania. This work was partially supported by ONR MURI N00014-07-0907, NSF CNS-0721845 and NSF IIS-0812270.

University of Pennsylvania. This work was partially supported by ONR MURI N00014-07-0907, NSF CNS-0721845 and NSF IIS-0812270. DMaC: : Distributed Monitoring and Checking Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup Lee University of Pennsylvania This work was partially supported by ONR MURI N00014-07-0907, NSF CNS-0721845

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

MRTG used for Basic Server Monitoring

MRTG used for Basic Server Monitoring MRTG used for Basic Server Monitoring SANS Institute Masters Presentation by T. Brian MRTG used for Basic Server Monitoring This presentation covers how-to instructions to establish basic server monitoring

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science)

AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science) [ AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science) Ph.D. PROPOSAL SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Implementation of College Network Scenario Module by Using CCNA

Implementation of College Network Scenario Module by Using CCNA Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,

More information

UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION

UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION 2007 Poznańskie Warsztaty Telekomunikacyjne Poznań 6-7 grudnia 2007 POZNAN POZNAN UNIVERSITY UNIVERSITYOF OF TECHNOLOGY ACADEMIC ACADEMIC JOURNALS JOURNALS No 54 Electrical Engineering 2007 Bartosz PAWŁOWICZ*

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

CribMaster Database and Client Requirements

CribMaster Database and Client Requirements FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster

More information

FileNet System Manager Dashboard Help

FileNet System Manager Dashboard Help FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their

More information

Local Area Networks: Software

Local Area Networks: Software School of Business Eastern Illinois University Local Area Networks: Software (Week 8, Thursday 3/1/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Identify main functions of operating systems Describe

More information

Tekla Structures 18 Hardware Recommendation

Tekla Structures 18 Hardware Recommendation 1 (5) Tekla Structures 18 Hardware Recommendation Recommendations for Tekla Structures workstations Tekla Structures hardware recommendations are based on the setups that have been used in testing Tekla

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Performance Monitoring and Analysis System for MUSCLE-based Applications

Performance Monitoring and Analysis System for MUSCLE-based Applications Polish Infrastructure for Supporting Computational Science in the European Research Space Performance Monitoring and Analysis System for MUSCLE-based Applications W. Funika, M. Janczykowski, K. Jopek,

More information

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

A Study on Workload Imbalance Issues in Data Intensive Distributed Computing

A Study on Workload Imbalance Issues in Data Intensive Distributed Computing A Study on Workload Imbalance Issues in Data Intensive Distributed Computing Sven Groot 1, Kazuo Goda 1, and Masaru Kitsuregawa 1 University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan Abstract.

More information

Information Technology Foundations

Information Technology Foundations Information Technology Foundations Primary Career Cluster: Consultant: Course Code(s): 6095 Recommended Prerequisite(s): Credit: 1-2* Grade Level: 9-10 Aligned Student Organization(s): Teacher Resources:

More information

STUDY GUIDE CHAPTER 4

STUDY GUIDE CHAPTER 4 STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface

More information

Network Troubleshooting with the LinkView Classic Network Analyzer

Network Troubleshooting with the LinkView Classic Network Analyzer November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network

More information

Supercomputing applied to Parallel Network Simulation

Supercomputing applied to Parallel Network Simulation Supercomputing applied to Parallel Network Simulation David Cortés-Polo Research, Technological Innovation and Supercomputing Centre of Extremadura, CenitS. Trujillo, Spain david.cortes@cenits.es Summary

More information

Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router iscsi Appliance

Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router iscsi Appliance Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router April 12, 2012 Table of Contents 1.0 Introduction... 4 2.0 Chelsio Unified Storage Router (USR) SAS-to-...

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming 1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

AXIS 262+ Network Video Recorder

AXIS 262+ Network Video Recorder 31433/EN/R4/0803 Complete Network Video Recording Solution Complete Network Video Recording Solution Picture this: A simple and reliable, plug-and-play video surveillance system for hotels, shops, banks,

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

WxGoos-1 Climate Monitor Installation Instructions Page 1. Connections. Setting an IP Address

WxGoos-1 Climate Monitor Installation Instructions Page 1. Connections. Setting an IP Address Instructions Page 1 Connections The WxGoos-1 is a self-contained web server and requires 6vdc of power at 300ma. A center-positive 2.1 mm plug is used. There are five ports: 1. 10/100 Ethernet RJ-45 receptacle

More information

System Development and Life-Cycle Management (SDLCM) Methodology

System Development and Life-Cycle Management (SDLCM) Methodology System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies the format and conventions to be used in developing

More information

COMPUTER NETWORKS - LAN Interconnection

COMPUTER NETWORKS - LAN Interconnection LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Technical Requirements

Technical Requirements CCASS Requirements Technical Requirements CCASS TERMINAL REQUIREMENTS INTRODUCTION: All designated banks can access CCASS host system through a browser-based terminal, the (C3T), which will use market

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Cisco Active Network Abstraction 4.0

Cisco Active Network Abstraction 4.0 Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network

More information